Multiple vulnerabilities have been identified in Apple Products, which could be exploited by attackers to cause the following impact(s):Denial of ServiceElevation of PrivilegeRemote Code ExecutionSecurity Restriction BypassInformation DisclosureSpoofing